US20100274980A1 - Techniques for system recovery using change tracking - Google Patents
Techniques for system recovery using change tracking Download PDFInfo
- Publication number
- US20100274980A1 US20100274980A1 US12/431,497 US43149709A US2010274980A1 US 20100274980 A1 US20100274980 A1 US 20100274980A1 US 43149709 A US43149709 A US 43149709A US 2010274980 A1 US2010274980 A1 US 2010274980A1
- Authority
- US
- United States
- Prior art keywords
- region
- electronic storage
- dirty
- indicator
- portions
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1415—Saving, restoring, recovering or retrying at system level
- G06F11/1441—Resetting or repowering
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1448—Management of the data involved in backup or backup restore
- G06F11/1451—Management of the data involved in backup or backup restore by selection of backup contents
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
- G06F11/1469—Backup restoration techniques
Definitions
- the present disclosure relates generally to system recovery and, more particularly, to techniques for system recovery using change tracking.
- a backup system may track modifications or write requests to data since a prior backup so that the system may backup modified data. For example, a backup system may make periodic incremental backups of modified data. Backing up only modified data may use less storage space than a full backup of all data and may require less network traffic and disk Input/Output (I/O) processing.
- I/O Input/Output
- Data modifications may be tracked to determine what to backup. Modified data which has been modified in memory but not yet written to disk is typically referred to as “dirty” data. Once modified data is written to disk it is typically referred to as “clean” data.
- Tracked data modifications or write requests may either be stored in memory or written to disk. If tracked data modifications are written to disk, they may require a write request for every write request to disk. This overhead and additional I/o may be unacceptable for performance. If tracked data modifications are stored in memory, they may be written to disk at system shutdown to avoid loss of the tracked data modifications. If a system crashes, shuts down improperly, or experiences interruptions, the tracked data modifications may be lost. A user may then be faced with two difficult options. They may perform a full backup of all data to capture all possible changes, which may require more storage and take longer than an incremental backup. Alternatively, they may perform a reconciliation operation, which may identify the modifications to data since the last backup (i.e., the lost tracked modifications).
- the reconciliation operation may identify modifications by comparing portions of used storage, such as used blocks of disk, to portions of the last backup. After completion of the reconciliation operation, an incremental backup may be performed. However, the reconciliation operation may take as long or longer and may require as much or more I/O processing than a full backup.
- the techniques may be realized as a computer implemented method for providing system recovery using change tracking comprising receiving a request to write to electronic storage, identifying a region in the electronic storage region associated with the write request, setting a region indicator identifying the electronic storage region as dirty, and setting one or more portion indicators identifying one or more dirty portions of the electronic storage region.
- system recovery using change tracking may further comprise determining whether to set the region indicator identifying the electronic storage region, and setting the region indicator in the event it is determined that the region indicator is to be set.
- determining whether to set the region indicator identifying the electronic storage region may be based at least in part on a determination that the region indicator is currently set.
- system recovery using change tracking may further comprise determining whether to set the one or more portion indicators identifying the one or more dirty portions, and setting the one or more portion indicators in the event it is determined that the one or more portion indicators are to be set.
- determining whether to set the one or more portion indicators identifying the one or more dirty portions may be based at least in part on at least one of: a determination that the one or more portion indicators are currently set, a determination that every portion indicator of the electronic storage region is currently set, a determination to capture allocated portions of the electronic storage regions and a determination to restore allocated portions of the electronic storage region.
- setting a region indicator may comprise setting an indicator in volatile electronic storage and setting an indicator in non-volatile electronic storage.
- setting one or more portion indicators may comprise setting an indicator in volatile electronic storage and setting an indicator in non-volatile electronic storage.
- identifying a time for setting the one or more portion indicators in non-volatile electronic storage may be based on at least one of: determining that no additional portion indicators have been set for a specified period of time; determining that all portion indicators for the electronic storage region have been set; and a lower level of disk activity associated with the region at the identified time.
- system recovery using change tracking may further comprise unsetting a region indicator after the one or more portion indicators have been set in non-volatile electronic storage.
- the one or more portion indicators may comprise at least one of: a bitmap, a run list, a range, and a data structure identifying one or more portions of dirty data.
- system recovery using change tracking may further comprise utilizing a plurality of levels of region indicators, wherein the plurality of levels of region indicators enable further subdivision of change tracking of the electronic storage.
- the dirty portions may comprise at least one of: blocks, sectors, and clusters.
- the dirty regions may comprise segments.
- system recovery using change tracking may further comprise creating an image of the electronic storage, comparing the image of the electronic storage with a backup of the electronic storage using the region indicator to identify a dirty region of the electronic storage, and updating the one or more portion indicators of the identified dirty region based on a determination that one or more portions of electronic storage corresponding to the portion indicators were modified subsequent to the backup.
- system recovery using change tracking may further comprise creating an incremental backup using the region indicator to identify a dirty region of electronic storage, wherein the incremental backup captures allocated portions of the region indicated as dirty and the incremental backup captures only modified portions of data in a clean region.
- system recovery using change tracking may further comprise restoring one or more portions of data from backup using the region indicator to identify a dirty region of the electronic storage, wherein restoration of allocated portions of an identified dirty region is performed, and wherein restoration of one or more modified portions of a clean region is performed.
- the techniques may be realized as at least one processor readable medium for storing a computer program of instructions configured to be readable by at least one processor for instructing the at least one processor to execute a computer process for performing the method as recited in claim 1 .
- the techniques may be realized as an article of manufacture for providing system recovery using change tracking, the article of manufacture comprising at least one processor readable medium, and instructions carried on the at least one medium, wherein the instructions are configured to be readable from the at least one medium by at least one processor and thereby cause the at least one processor to operate so as to receive a request to write to electronic storage, identify a region in the electronic storage associated with the write request, set a region indicator identifying the electronic storage region as dirty, and set one or more portion indicators identifying one or more dirty portions of the electronic storage region.
- the techniques may be realized as a system providing system recovery using change tracking comprising one or more processors communicatively coupled to a network, wherein the one or more processors are configured to receive a request to write to electronic storage, identify a region in the electronic storage associated with the write request, set a region indicator identifying the electronic storage region as dirty, and set one or more portion indicators identifying one or more dirty portions of the electronic storage region.
- the one or more processors may further be configured to perform, using the region indicator, at least one of: a system reconciliation, a system backup, and a system restoration.
- FIG. 1 shows a system for providing system recovery in accordance with an embodiment of the present disclosure.
- FIG. 2 shows a module for providing system recovery in accordance with an embodiment of the present disclosure.
- FIG. 3 depicts a method for providing system recovery in accordance with an embodiment of the present disclosure.
- FIG. 4 depicts a method for providing system reconciliation in accordance with an embodiment of the present disclosure.
- FIG. 5 depicts a method for providing an incremental backup in accordance with an embodiment of the present disclosure.
- FIG. 6 depicts a method for providing system restoration in accordance with an embodiment of the present disclosure.
- FIG. 1 is a simplified view of system 100 , which may include additional elements that are not depicted.
- Network elements 104 and 110 may be communicatively coupled to network 102 .
- Network element 104 may contain modification tracking module 114 .
- Computer 108 may be communicatively coupled to network 102 .
- Data 106 may be communicatively coupled to network element 104 .
- Storage 112 may be communicatively coupled to network element 110 .
- Network 102 may be a local area network (LAN), a wide area network (WAN), the Internet, a cellular network, a satellite network, or another network that permits communication between network elements 104 and 110 , computer 108 and other devices communicatively coupled to network 102 .
- LAN local area network
- WAN wide area network
- the Internet the Internet
- cellular network a cellular network
- satellite network or another network that permits communication between network elements 104 and 110 , computer 108 and other devices communicatively coupled to network 102 .
- Network elements 104 and 110 may be application servers, backup servers, network storage devices, media servers, or other devices communicatively coupled to network 102 .
- Network elements 104 and 110 may utilize storage 112 for the storage of application data, backup data, or other data.
- Network elements 104 and 110 may be hosts, such as an application server, which may process data traveling between itself and a backup device, a backup process, and/or storage.
- Network element 110 may be a backup server attached to storage 112 .
- network element 110 may be capable of processing data received from or transmitted to storage 112 .
- network element 110 may represent a network appliance connected to a storage area network.
- Computer 108 may be a desktop computer, a laptop computer, a server, or other computer. Computer 108 may receive data from user input, a database, a file, a web service, and/or an application programming interface. Computer 108 may query other systems and/or local or remote storage, such as data 110 , network elements 104 and 110 , and storage 112 . Computer 108 may provide a user interface to a backup system, a data recovery system, or another data management system.
- Data 106 may be network accessible storage and may be local, remote, or a combination thereof to network elements 104 and 110 .
- Data 106 may utilize a tape, disk, a storage area network (SAN), or other computer accessible storage.
- data 106 may represent a database or another application instance.
- data in storage 112 may be images, such as snapshots or other file system block level backups.
- Network element 110 may be a backup server which may handle requests for backup data.
- Network element 104 may contain modification tracking module 114 .
- Modification tracking module 114 may track write requests to data 106 .
- modification tracking module 114 may be a change tracking driver.
- Modification tracking module 114 may track write requests in memory or may send write requests to a backup server or another network element, such as network element 110 .
- the modifications tracked by modification tracking module 114 may be stored in memory and/or on non-volatile storage such as disk.
- modification tracking module 114 may utilize a plurality of levels of change tracking.
- modification tracking module 114 may contain logic or data logically subdividing storage, such as data 106 , into regions. There may be a plurality of regions for a unit of storage, such as a volume. The number of regions may depend on the size of the volume or other factors. In some embodiments, it may be configurable.
- a region may be a logical division of storage such as a segment.
- a region may be composed of a plurality of portions of data storage such as blocks, sectors, and/or clusters. The size of a portion of data storage, such as a block, may depend upon the operating system or other factors. In some embodiments, it may be configurable.
- Modification tracking module 114 may track changes at a region level and at a finer level of granularity such as a block.
- Modification tracking module 114 may create a plurality of data structures to track changes such as bitmaps, run lists (e.g., a data structure which may provide an address of a first portion of used storage and a length or number of units of used storage), arrays, pointers, ranges, and other data structures for efficiently identifying used portions of electronic storage. Modification tracking module 114 may use a first data structure to identify regions of electronic storage which have been modified, which may be referred to as a “dirty region map.” A dirty region map may contain one bit or other indicators for each region on the unit of storage being tracked by modification tracking module 114 , such as a volume. A dirty region map may be maintained in volatile and non-volatile storage.
- modification tracking module 114 may maintain a data structure containing a bit or other indicator for each portion of data storage of the region, such as a block. This may be referred to as a “block map”.
- modification tracking module 114 may identify the region corresponding to the write request and may set the appropriate bit or other indicator in the dirty region map which corresponds to the region. Modification tracking module 114 may also set appropriate bits or indicators in one or more block maps in memory which may identify the modified portions of each dirty region.
- the dirty region map may be maintained in volatile and non-volatile storage. For example, an appropriate bit may be set in the dirty region map in memory and on disk, prior to a write. Appropriate bits may also be set in memory for one or more block maps. Thus, if a system crash, improper shutdown, or other interruption occurs, the dirty region map indicating one or more modified regions may be preserved in non-volatile memory.
- the block maps may not be written to non-volatile storage during the processing of the tracked write request.
- the write request may be written to disk, but the tracking of the modified blocks for system recovery may be written to memory (e.g., to one or more block maps).
- the tracking of the modified blocks may be written to disk.
- Write requests may typically occur in groups, thus many write requests may occur sequentially to the same region. For each subsequent write request to the region, modification tracking module 114 may verify that the appropriate bit is set in the dirty region map in memory and the write requests may be processed without requiring an additional write to track the modifications.
- modification tracking module 114 may write to block maps on non-volatile storage (e.g., flush the block maps to disk) indicating which blocks have been modified.
- block map for a region has been written to non-volatile storage
- the dirty region map may be updated to unset or clear the indicator for the region (i.e., mark the region as clean).
- Modification tracking module 114 may use additional flags or indicators. For example, two extra indicators may be provided for each region. A first indicator may be set if a region has not been dirty previously (e.g., no changes have occurred to the blocks of a region since the last backup). This may enable modification tracking module 114 to write block maps for that region directly to disk from memory without first checking to see if block maps exist on disk that may require updating. A second indicator may be set if every block in a region has been modified. If every block in a region has been modified modification tracking module 114 may stop tracking changes to blocks in the region (i.e., a subsequent operation such as a backup operation may understand that all blocks are to be captured.)
- a backup component or process may perform a reconciliation operation using the dirty region map, as described in further detail below in reference to FIG. 4 . This may enable modification change tracking to continue.
- a backup process or component may perform other operations in addition to or as an alternative to the reconciliation operation.
- a backup process or component may also perform an incremental backup using the dirty region map and one or more block maps, as described in further detail in reference to FIG. 5 below.
- a backup process or component may further perform a restoration operation using the dirty region map and one or more block maps, as described in reference to FIG. 5 below.
- the recovery change tracking module 210 may contain one or more components including write tracking module 212 , reconciliation module 214 , incremental backup module 216 , restoration module 218 , and error handling module 220 .
- Write tracking module 212 may detect an interrupt or a request to write to non-volatile storage, such as disk.
- Write tracking module 212 may determine a region associated with the write request and may set a bit, a flag, or other indicator signifying that the region is dirty (i.e., the region has been written to, but the block modification changes tracked for system recovery have not been saved to the block maps in non-volatile storage).
- the indicator, bit, or flag may be set in memory and written to disk.
- Write tracking module 212 may track changes to portions of a region such as blocks. These modifications may be tracked by setting a flag, an indicator, or a bit in one or more block maps in memory. Once write requests to a region have subsided, write tracking module 212 may write one or more block maps to non-volatile storage (e.g., flush block maps to disk). The determination of when to write a block map to non-volatile storage may be based on various algorithms. According to some embodiments, the level of writes to a region may be monitored and one or more block maps may be written to non-volatile storage a specified period of time after the level of writes to a region has dropped below a specified threshold. For example, the block map may be written to non-volatile storage thirty seconds after write requests to a region have stopped.
- non-volatile storage e.g., flush block maps to disk.
- write tracking module 212 may mark the region as clean.
- Write tracking module 212 may mark a region as clean by unsetting or setting an indicator, flag, or bit corresponding to the appropriate region in the dirty region map.
- the dirty region map may contain a plurality of region indicators.
- write tracking module 212 may manage a plurality of levels of dirty region maps.
- a top level map may contain indicators corresponding to a sub-level of dirty region maps.
- Each of these dirty region maps may comprise a plurality of block maps.
- the number of block maps to a region, the number of layers or levels of regions, the size of the block maps, and the size of the dirty region maps may be determined by a number of factors, including storage size, available memory, user preferences, and calculated processing times of backup system operations.
- Reconciliation module 214 may enable the reconciliation of modification tracking after a system crash, an improper system shutdown, an outage, or other system interruption. Such reconciliation may enable modifications in dirty regions to be identified and written to one or more block maps in non-volatile storage so that dirty regions may be set as clean (e.g., a corresponding indicator in a dirty region map may be reset). Reconciliation module 214 may create an image, such as a snapshot, of storage after a system crash or other outage. Reconciliation module 214 may then compare this image with a most recent backup using a dirty region map. Reconciliation module 214 may check one or more portions of the image, such as blocks, against corresponding portions of the most recent backup.
- Reconciliation module 214 may check only one or more portions of the image and/or backup within regions indicated as dirty by the dirty region map.
- One or more block maps which correspond to portions of the backup that are different from the image may be updated to indicate that the portions have been modified (e.g., the regions may already have been indicated as dirty, since the reconcile operation may be directed to reconcile regions marked as dirty).
- the reconciliation process is complete for that region. When all dirty regions have been reconciled, reconciliation may be complete.
- the reconciliation process may only perform updates in memory to block maps in dirty regions. Writes to a non-volatile copy of the block maps may be performed later depending on the level of write activity to the non-volatile storage region (e.g., a sector of a disk).
- a second set of change tracking maps may be created.
- the reconciliation process may continue using the prior set of change tracking maps (i.e., one or more dirty regions maps and one or more block maps) Modification tracking may continue and may use the second set of change tracking maps.
- prior dirty region maps may not be required and may be discarded.
- Prior block maps may be combined with the new block maps at a later time, such as at backup.
- Incremental backup module 216 may enable an incremental backup to be performed after a system crash, an outage, or other disruption. For one or more regions indicated as clean in a dirty region map (e.g., not flagged in the dirty region map), portions, such as blocks, which are marked as modified in one or more block maps of the one or more regions may be backed up. For one or more regions marked as dirty in a dirty region map, all used portions of storage in the one or more regions may be backed up. This may be significantly faster than a full backup and may use less space and require less overhead and I/O processing than if each modified portion, such as a block, had been flagged in non-volatile storage for each write.
- Restoration module 218 may enable restoration of data after a system crash, outage, or other interruption.
- a user may desire to roll back the data or return the system to an earlier state (e.g., a software upgrade or installation may have been responsible for the crash and a restore may put back an earlier stable version.)
- Restoration module 218 may use a dirty region map and one or more block maps to identify changed data to be restored. In one or more regions indicated as clean in a dirty region map, restoration module 218 may restore only portions of data which were modified since a last backup, as indicated by one or more block maps.
- restoration module 218 may restore all portions or blocks of data,
- the number of dirty regions may typically be small and the number of changed portions in clean regions may be significantly less than in the entire region. Thus, restoration time and I/O processing may be significantly less than that of a full restoration.
- Error handling module 220 may handle errors associated with modification tracking, reconciliation of modification tracking, backups, and restorations. Error handling module 220 may log errors, such as errors occurring during modification tracking, and other error related events.
- a method 300 for providing system recovery in accordance with an embodiment of the present disclosure.
- the method 300 may begin.
- the method 300 may comprise receiving a request to write to storage.
- the request may be received by a device driver tracking write requests to storage such as disk, tape, or other storage media.
- the method 300 may comprise identifying a region associated with an area of storage targeted by the write request.
- the size and number of one or more regions for a storage area may vary depending on the size of the storage area, the operating system, or other factors.
- a corresponding indicator, flag, or bit corresponding to a dirty region map may be identified.
- there may be a plurality of dirty region maps and an appropriate dirty region map may be identified (e.g., a top level dirty region map may contain indicators to a plurality of lower level dirty region maps, which may provide further subdivision of storage).
- the method 300 may comprise determining whether a dirty region indicator, bit, or flag requires setting.
- the region may be indicated as clean on a dirty region map and may require setting an indicator to signify the region is dirty. If other writes in the region have occurred which have not been recorded in one or more block maps in non-volatile storage, the region may already be indicated as dirty in a dirty region map, Other factors may be considered when determining whether to set a region to dirty. For example, if every portion of a region has already been indicated as modified in corresponding block maps in non-volatile storage, it may not be necessary in some embodiments to mark a region as dirty. If a corresponding region indicator is to be set, the method 300 may continue at block 310 . If a corresponding region indicator does not require setting, the method 300 may continue at block 312 .
- the method 300 may comprise setting an appropriate flag, bit, or indicator corresponding to a region to be marked as dirty (i.e., the region for which the write request was received).
- the setting of the flag, bit, or other indicator may occur in memory, followed by writing the updated portion of the dirty region map to non-volatile storage, such as disk. After writing the dirty region map update to non-volatile storage, the method 300 may continue at block 311 .
- the write request may be completed.
- the data identified in the write request may be written to non-volatile storage such as disk.
- the method 300 may comprise determining whether or not to write to non-volatile storage one or more block indicators corresponding to portions of storage modified in the write request.
- the block indicators may be set in a block map in memory.
- a determination may also be made whether to write block maps from memory to non-volatile storage, such as disk. The determination may be made based on a level of storage I/O processing occurring, such as the level of I/O processing associated with a corresponding region of a disk. In one or more embodiments, other factors may be considered.
- a flag or indicator may be set when every portion of a region has been indicated as modified on non-volatile storage (e.g., all bits of block maps for the region have previously been set in non-volatile storage and the region has previously been marked as clean). If one or more block indicators for a region are not to be set because all block indicators for the region have been set or because of other factors, the method 300 may end at block 320 . If one or more block indicators for a region are not to be set at the present time because of a level of storage I/O processing or other factors, the method 300 may continue at block 314 . If one or more block indicators for a region are to be set, the method 300 may continue at block 316 .
- the method 300 may comprise waiting.
- the wait period may be specified by a users specified by the system, determined by an algorithm, or received as an input. After the expiration of the wait period, the method 300 may return to block 312 .
- the method 300 may comprise setting block indicators corresponding to modified blocks.
- One or more block maps may be written to non-volatile storage. This may involve reading a prior block map from non-volatile storage and updating it.
- additional indicators may be used. For example, there may be an indicator set for a region if that region has not previously been dirty. If this indicator is set, updates to blocks in that region may not require reading in a block map from non-volatile storage prior to updating a block map, since the block maps in that region have not previously been set.
- the method 300 may comprise clearing one or more region indicators. Once all block maps for a region have been written to storage, a region indicator in a corresponding dirty region map may be cleared.
- the method 300 may end.
- a method 400 for providing system reconciliation in accordance with an embodiment of the present disclosure.
- the method 400 may begin.
- the method 400 may comprise determining or receiving input regarding whether to continue change tracking or perform another action, such as a backup or a restore. If change tracking is to be continued, the method 400 may continue at block 414 . Otherwise, method 400 may continue at block 406 .
- the method 400 may comprise determining or receiving input as to a further action to take. If a backup is to be taken, the method 400 may continue at block 410 . If a restoration is to be performed, the method 400 may continue at block 408 .
- the method 408 may comprise performing a restore operation. Performing a restore operation using change tracking is described in further detail in reference to FIG. 6 below.
- the method 400 may comprise performing a backup, such as an incremental backup. Performing an incremental backup using change tracking is described in further detail in reference to FIG. 5 below.
- the method 400 may comprise creating an image of storage, such as a snapshot. According to one or more embodiments, once an image has been created change tracking may resume.
- the method 400 may comprise comparing portions of the image, in regions indicated as dirty by a dirty region map, to corresponding portions in a backup.
- the comparison may identify one or more portions of a dirty region which may have been modified since the backup was created.
- the method 400 may comprise updating one or more flags, bits, or other indicators on one or more block maps.
- the updates may correspond to portions identified as modified in block 416 .
- the method 400 may comprise continuing change tracking.
- the method 400 may end.
- a method 500 for providing an incremental backup in accordance with an embodiment of the present disclosure.
- the method 500 may begin.
- the method 500 may comprise determining whether a region is clean or dirty.
- the method 500 may comprise using one or more dirty region maps to identify a corresponding dirty region indicator on a map. If the corresponding indicator is set, the method 500 may continue at block 508 . If the corresponding indicator is not set, the method 500 may continue at block 506 .
- the method 500 may comprise capturing to backup blocks indicated as changed in a region indicated as clean. It may only capture a subset of the changed blocks, namely those allocated by the file system.
- the method 500 may comprise capturing to backup blocks allocated by the file system in a region indicated as dirty.
- the method 500 may comprise determining whether there are more regions to be backed up. If there are more regions to be backed up, the method 500 may return to block 504 . If there are no more regions to be backed up, the method may continue at block 512 .
- the method 500 may comprise deduplicating backup data. Such deduplication may reduce and/or remove redundant data and may decrease storage and I/O processing required for the backup data. For example, if some blocks captured at block 508 have not changed since a prior backup, this step may identify them as having been previously backed up. This may prevent the blocks from being stored a second time (i.e., redundantly).
- the method 500 may end.
- a method 600 for providing system restoration in accordance with an embodiment of the present disclosure.
- the method 600 may begin.
- the method 600 may comprise determining whether a region is clean or dirty.
- the method 600 may comprise using one or more dirty region maps to identify a corresponding dirty region indicator on a map. If the corresponding indicator is set, the method 600 may continue at block 608 . If the corresponding indicator is not set, the method 600 may continue at block 606 .
- the method 600 may comprise restoring backup portions, such as blocks, indicated as changed in a region indicated as clean.
- the method 600 may comprise restoring all backup blocks in a region indicated as dirty.
- the method 600 may comprise determining whether additional regions are to be restored. If additional regions are to be restored, the method 600 may return to block 604 . If no additional regions are to be restored, the method 600 may continue at block 612 .
- the method 600 may end.
- providing a system recovery in accordance with the present disclosure as described above typically involves the processing of input data and the generation of output data to some extent.
- This input data processing and output data generation may be implemented in hardware or software.
- specific electronic components may be employed in a module for system recovery or similar or related circuitry for implementing the functions associated with providing system recovery in accordance with the present disclosure as described above.
- one or more processors operating in accordance with instructions may implement the functions associated with providing system recovery in accordance with the present disclosure as described above.
- Such instructions may be stored on one or more processor readable media (e.g., a magnetic disk or other storage medium), or transmitted to one or more processors via one or more signals embodied in one or more carrier waves.
- processor readable media e.g., a magnetic disk or other storage medium
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Retry When Errors Occur (AREA)
- Radar Systems Or Details Thereof (AREA)
Abstract
Description
- The present disclosure relates generally to system recovery and, more particularly, to techniques for system recovery using change tracking.
- A backup system may track modifications or write requests to data since a prior backup so that the system may backup modified data. For example, a backup system may make periodic incremental backups of modified data. Backing up only modified data may use less storage space than a full backup of all data and may require less network traffic and disk Input/Output (I/O) processing.
- Data modifications may be tracked to determine what to backup. Modified data which has been modified in memory but not yet written to disk is typically referred to as “dirty” data. Once modified data is written to disk it is typically referred to as “clean” data.
- Tracked data modifications or write requests may either be stored in memory or written to disk. If tracked data modifications are written to disk, they may require a write request for every write request to disk. This overhead and additional I/o may be unacceptable for performance. If tracked data modifications are stored in memory, they may be written to disk at system shutdown to avoid loss of the tracked data modifications. If a system crashes, shuts down improperly, or experiences interruptions, the tracked data modifications may be lost. A user may then be faced with two difficult options. They may perform a full backup of all data to capture all possible changes, which may require more storage and take longer than an incremental backup. Alternatively, they may perform a reconciliation operation, which may identify the modifications to data since the last backup (i.e., the lost tracked modifications). The reconciliation operation may identify modifications by comparing portions of used storage, such as used blocks of disk, to portions of the last backup. After completion of the reconciliation operation, an incremental backup may be performed. However, the reconciliation operation may take as long or longer and may require as much or more I/O processing than a full backup.
- In view of the foregoing, it may be understood that there may be significant problems and shortcomings associated with current system recovery technologies.
- Techniques for system recovery using change tracking are disclosed. In one particular exemplary embodiment, the techniques may be realized as a computer implemented method for providing system recovery using change tracking comprising receiving a request to write to electronic storage, identifying a region in the electronic storage region associated with the write request, setting a region indicator identifying the electronic storage region as dirty, and setting one or more portion indicators identifying one or more dirty portions of the electronic storage region.
- In accordance with other aspects of this particular exemplary embodiment, system recovery using change tracking may further comprise determining whether to set the region indicator identifying the electronic storage region, and setting the region indicator in the event it is determined that the region indicator is to be set.
- In accordance with further aspects of this particular exemplary embodiment, determining whether to set the region indicator identifying the electronic storage region may be based at least in part on a determination that the region indicator is currently set.
- In accordance with additional aspects of this particular exemplary embodiment, system recovery using change tracking may further comprise determining whether to set the one or more portion indicators identifying the one or more dirty portions, and setting the one or more portion indicators in the event it is determined that the one or more portion indicators are to be set.
- In accordance with additional aspects of this particular exemplary embodiment, determining whether to set the one or more portion indicators identifying the one or more dirty portions may be based at least in part on at least one of: a determination that the one or more portion indicators are currently set, a determination that every portion indicator of the electronic storage region is currently set, a determination to capture allocated portions of the electronic storage regions and a determination to restore allocated portions of the electronic storage region.
- In accordance with additional aspects of this particular exemplary embodiment, setting a region indicator may comprise setting an indicator in volatile electronic storage and setting an indicator in non-volatile electronic storage.
- In accordance with additional aspects of this particular exemplary embodiment, setting one or more portion indicators may comprise setting an indicator in volatile electronic storage and setting an indicator in non-volatile electronic storage.
- In accordance with additional aspects of this particular exemplary embodiment, identifying a time for setting the one or more portion indicators in non-volatile electronic storage may be based on at least one of: determining that no additional portion indicators have been set for a specified period of time; determining that all portion indicators for the electronic storage region have been set; and a lower level of disk activity associated with the region at the identified time.
- In accordance with additional aspects of this particular exemplary embodiment, system recovery using change tracking may further comprise unsetting a region indicator after the one or more portion indicators have been set in non-volatile electronic storage.
- In accordance with additional aspects of this particular exemplary embodiment, the one or more portion indicators may comprise at least one of: a bitmap, a run list, a range, and a data structure identifying one or more portions of dirty data.
- In accordance with additional aspects of this particular exemplary embodiment, system recovery using change tracking may further comprise utilizing a plurality of levels of region indicators, wherein the plurality of levels of region indicators enable further subdivision of change tracking of the electronic storage.
- In accordance with additional aspects of this particular exemplary embodiment, the dirty portions may comprise at least one of: blocks, sectors, and clusters.
- In accordance with additional aspects of this particular exemplary embodiment, the dirty regions may comprise segments.
- In accordance with additional aspects of this particular exemplary embodiment, system recovery using change tracking may further comprise creating an image of the electronic storage, comparing the image of the electronic storage with a backup of the electronic storage using the region indicator to identify a dirty region of the electronic storage, and updating the one or more portion indicators of the identified dirty region based on a determination that one or more portions of electronic storage corresponding to the portion indicators were modified subsequent to the backup.
- In accordance with additional aspects of this particular exemplary embodiment, system recovery using change tracking may further comprise creating an incremental backup using the region indicator to identify a dirty region of electronic storage, wherein the incremental backup captures allocated portions of the region indicated as dirty and the incremental backup captures only modified portions of data in a clean region.
- In accordance with additional aspects of this particular exemplary embodiment, system recovery using change tracking may further comprise restoring one or more portions of data from backup using the region indicator to identify a dirty region of the electronic storage, wherein restoration of allocated portions of an identified dirty region is performed, and wherein restoration of one or more modified portions of a clean region is performed.
- In accordance with additional aspects of this particular exemplary embodiment, the techniques may be realized as at least one processor readable medium for storing a computer program of instructions configured to be readable by at least one processor for instructing the at least one processor to execute a computer process for performing the method as recited in claim 1.
- In another particular exemplary embodiment, the techniques may be realized as an article of manufacture for providing system recovery using change tracking, the article of manufacture comprising at least one processor readable medium, and instructions carried on the at least one medium, wherein the instructions are configured to be readable from the at least one medium by at least one processor and thereby cause the at least one processor to operate so as to receive a request to write to electronic storage, identify a region in the electronic storage associated with the write request, set a region indicator identifying the electronic storage region as dirty, and set one or more portion indicators identifying one or more dirty portions of the electronic storage region.
- In yet another particular exemplary embodiment, the techniques may be realized as a system providing system recovery using change tracking comprising one or more processors communicatively coupled to a network, wherein the one or more processors are configured to receive a request to write to electronic storage, identify a region in the electronic storage associated with the write request, set a region indicator identifying the electronic storage region as dirty, and set one or more portion indicators identifying one or more dirty portions of the electronic storage region.
- In accordance with other aspects of this particular exemplary embodiment, the one or more processors may further be configured to perform, using the region indicator, at least one of: a system reconciliation, a system backup, and a system restoration.
- The present disclosure will now be described in more detail with reference to exemplary embodiments thereof as shown in the accompanying drawings. While the present disclosure is described below with reference to exemplary embodiments, it should be understood that the present disclosure is not limited thereto. Those of ordinary skill in the art having access to the teachings herein will recognize additional implementations, modifications, and embodiments, as well as other fields of use, which are within the scope of the present disclosure as described herein, and with respect to which the present disclosure may be of significant utility.
- In order to facilitate a fuller understanding of the present disclosure, reference is now made to the accompanying drawings, in which like elements are referenced with like numerals. These drawings should not be construed as limiting the present disclosure, but are intended to be exemplary only.
-
FIG. 1 shows a system for providing system recovery in accordance with an embodiment of the present disclosure. -
FIG. 2 shows a module for providing system recovery in accordance with an embodiment of the present disclosure. -
FIG. 3 depicts a method for providing system recovery in accordance with an embodiment of the present disclosure. -
FIG. 4 depicts a method for providing system reconciliation in accordance with an embodiment of the present disclosure. -
FIG. 5 depicts a method for providing an incremental backup in accordance with an embodiment of the present disclosure. -
FIG. 6 depicts a method for providing system restoration in accordance with an embodiment of the present disclosure. - Referring to
FIG. 1 , there is shown asystem 100 for providing system recovery in accordance with an embodiment of the present disclosure.FIG. 1 is a simplified view ofsystem 100, which may include additional elements that are not depicted.Network elements network 102.Network element 104 may contain modification tracking module 114.Computer 108 may be communicatively coupled tonetwork 102.Data 106 may be communicatively coupled tonetwork element 104.Storage 112 may be communicatively coupled tonetwork element 110. - Network 102 may be a local area network (LAN), a wide area network (WAN), the Internet, a cellular network, a satellite network, or another network that permits communication between
network elements computer 108 and other devices communicatively coupled tonetwork 102. -
Network elements network 102.Network elements storage 112 for the storage of application data, backup data, or other data. -
Network elements -
Network element 110 may be a backup server attached tostorage 112. In one or more embodiments,network element 110 may be capable of processing data received from or transmitted tostorage 112. In other embodiments,network element 110 may represent a network appliance connected to a storage area network. -
Computer 108 may be a desktop computer, a laptop computer, a server, or other computer.Computer 108 may receive data from user input, a database, a file, a web service, and/or an application programming interface.Computer 108 may query other systems and/or local or remote storage, such asdata 110,network elements storage 112.Computer 108 may provide a user interface to a backup system, a data recovery system, or another data management system. -
Data 106 may be network accessible storage and may be local, remote, or a combination thereof to networkelements Data 106 may utilize a tape, disk, a storage area network (SAN), or other computer accessible storage. In one or more embodiments,data 106 may represent a database or another application instance. - In one or more embodiments, data in
storage 112 may be images, such as snapshots or other file system block level backups.Network element 110 may be a backup server which may handle requests for backup data. -
Network element 104 may contain modification tracking module 114. Modification tracking module 114 may track write requests todata 106. In one or more embodiments, modification tracking module 114 may be a change tracking driver. Modification tracking module 114 may track write requests in memory or may send write requests to a backup server or another network element, such asnetwork element 110. The modifications tracked by modification tracking module 114 may be stored in memory and/or on non-volatile storage such as disk. - According to one or more embodiments, modification tracking module 114 may utilize a plurality of levels of change tracking. For example, modification tracking module 114 may contain logic or data logically subdividing storage, such as
data 106, into regions. There may be a plurality of regions for a unit of storage, such as a volume. The number of regions may depend on the size of the volume or other factors. In some embodiments, it may be configurable. A region may be a logical division of storage such as a segment. A region may be composed of a plurality of portions of data storage such as blocks, sectors, and/or clusters. The size of a portion of data storage, such as a block, may depend upon the operating system or other factors. In some embodiments, it may be configurable. Modification tracking module 114 may track changes at a region level and at a finer level of granularity such as a block. - Modification tracking module 114 may create a plurality of data structures to track changes such as bitmaps, run lists (e.g., a data structure which may provide an address of a first portion of used storage and a length or number of units of used storage), arrays, pointers, ranges, and other data structures for efficiently identifying used portions of electronic storage. Modification tracking module 114 may use a first data structure to identify regions of electronic storage which have been modified, which may be referred to as a “dirty region map.” A dirty region map may contain one bit or other indicators for each region on the unit of storage being tracked by modification tracking module 114, such as a volume. A dirty region map may be maintained in volatile and non-volatile storage.
- For each region, modification tracking module 114 may maintain a data structure containing a bit or other indicator for each portion of data storage of the region, such as a block. This may be referred to as a “block map”.
- When a write request is detected by modification tracking module 114, modification tracking module 114 may identify the region corresponding to the write request and may set the appropriate bit or other indicator in the dirty region map which corresponds to the region. Modification tracking module 114 may also set appropriate bits or indicators in one or more block maps in memory which may identify the modified portions of each dirty region.
- As mentioned above, the dirty region map may be maintained in volatile and non-volatile storage. For example, an appropriate bit may be set in the dirty region map in memory and on disk, prior to a write. Appropriate bits may also be set in memory for one or more block maps. Thus, if a system crash, improper shutdown, or other interruption occurs, the dirty region map indicating one or more modified regions may be preserved in non-volatile memory.
- However, according to some embodiments, the block maps may not be written to non-volatile storage during the processing of the tracked write request. For example, the write request may be written to disk, but the tracking of the modified blocks for system recovery may be written to memory (e.g., to one or more block maps). Once the write request has completed, the tracking of the modified blocks may be written to disk. Write requests may typically occur in groups, thus many write requests may occur sequentially to the same region. For each subsequent write request to the region, modification tracking module 114 may verify that the appropriate bit is set in the dirty region map in memory and the write requests may be processed without requiring an additional write to track the modifications. Once the write requests to a region have stopped or paused, for one or more regions flagged or indicated in the dirty region map, modification tracking module 114 may write to block maps on non-volatile storage (e.g., flush the block maps to disk) indicating which blocks have been modified. Once a block map for a region has been written to non-volatile storage, the dirty region map may be updated to unset or clear the indicator for the region (i.e., mark the region as clean).
- Modification tracking module 114 may use additional flags or indicators. For example, two extra indicators may be provided for each region. A first indicator may be set if a region has not been dirty previously (e.g., no changes have occurred to the blocks of a region since the last backup). This may enable modification tracking module 114 to write block maps for that region directly to disk from memory without first checking to see if block maps exist on disk that may require updating. A second indicator may be set if every block in a region has been modified. If every block in a region has been modified modification tracking module 114 may stop tracking changes to blocks in the region (i.e., a subsequent operation such as a backup operation may understand that all blocks are to be captured.)
- In the event of a system crash or disruption, a backup component or process, such as a backup process running on
network element 110, may perform a reconciliation operation using the dirty region map, as described in further detail below in reference toFIG. 4 . This may enable modification change tracking to continue. A backup process or component may perform other operations in addition to or as an alternative to the reconciliation operation. For example, a backup process or component may also perform an incremental backup using the dirty region map and one or more block maps, as described in further detail in reference toFIG. 5 below. A backup process or component may further perform a restoration operation using the dirty region map and one or more block maps, as described in reference toFIG. 5 below. - Referring to
FIG. 2 , there is shown a recoverychange tracking module 210 for providing system recovery in accordance with an embodiment of the present disclosure. As illustrated, the recoverychange tracking module 210 may contain one or more components includingwrite tracking module 212,reconciliation module 214,incremental backup module 216,restoration module 218, anderror handling module 220. - Write
tracking module 212 may detect an interrupt or a request to write to non-volatile storage, such as disk. Writetracking module 212 may determine a region associated with the write request and may set a bit, a flag, or other indicator signifying that the region is dirty (i.e., the region has been written to, but the block modification changes tracked for system recovery have not been saved to the block maps in non-volatile storage). The indicator, bit, or flag may be set in memory and written to disk. - Write
tracking module 212 may track changes to portions of a region such as blocks. These modifications may be tracked by setting a flag, an indicator, or a bit in one or more block maps in memory. Once write requests to a region have subsided, writetracking module 212 may write one or more block maps to non-volatile storage (e.g., flush block maps to disk). The determination of when to write a block map to non-volatile storage may be based on various algorithms. According to some embodiments, the level of writes to a region may be monitored and one or more block maps may be written to non-volatile storage a specified period of time after the level of writes to a region has dropped below a specified threshold. For example, the block map may be written to non-volatile storage thirty seconds after write requests to a region have stopped. - Once one or more of the block maps for a region have been written to non-volatile storage, write
tracking module 212, may mark the region as clean. Writetracking module 212 may mark a region as clean by unsetting or setting an indicator, flag, or bit corresponding to the appropriate region in the dirty region map. The dirty region map may contain a plurality of region indicators. According to some embodiments, writetracking module 212 may manage a plurality of levels of dirty region maps. For example, a top level map may contain indicators corresponding to a sub-level of dirty region maps. Each of these dirty region maps may comprise a plurality of block maps. The number of block maps to a region, the number of layers or levels of regions, the size of the block maps, and the size of the dirty region maps may be determined by a number of factors, including storage size, available memory, user preferences, and calculated processing times of backup system operations. -
Reconciliation module 214 may enable the reconciliation of modification tracking after a system crash, an improper system shutdown, an outage, or other system interruption. Such reconciliation may enable modifications in dirty regions to be identified and written to one or more block maps in non-volatile storage so that dirty regions may be set as clean (e.g., a corresponding indicator in a dirty region map may be reset).Reconciliation module 214 may create an image, such as a snapshot, of storage after a system crash or other outage.Reconciliation module 214 may then compare this image with a most recent backup using a dirty region map.Reconciliation module 214 may check one or more portions of the image, such as blocks, against corresponding portions of the most recent backup.Reconciliation module 214 may check only one or more portions of the image and/or backup within regions indicated as dirty by the dirty region map. One or more block maps which correspond to portions of the backup that are different from the image may be updated to indicate that the portions have been modified (e.g., the regions may already have been indicated as dirty, since the reconcile operation may be directed to reconcile regions marked as dirty). Once the modified portions of a dirty region have been indicated appropriately in corresponding block maps of the dirty region, the reconciliation process is complete for that region. When all dirty regions have been reconciled, reconciliation may be complete. Depending on user preference, system settings, or other factors, the reconciliation process may only perform updates in memory to block maps in dirty regions. Writes to a non-volatile copy of the block maps may be performed later depending on the level of write activity to the non-volatile storage region (e.g., a sector of a disk). - In one or more embodiments, when
reconciliation module 214 creates an image a second set of change tracking maps may be created. The reconciliation process may continue using the prior set of change tracking maps (i.e., one or more dirty regions maps and one or more block maps) Modification tracking may continue and may use the second set of change tracking maps. After reconciliation is complete prior dirty region maps may not be required and may be discarded. Prior block maps may be combined with the new block maps at a later time, such as at backup. -
Incremental backup module 216 may enable an incremental backup to be performed after a system crash, an outage, or other disruption. For one or more regions indicated as clean in a dirty region map (e.g., not flagged in the dirty region map), portions, such as blocks, which are marked as modified in one or more block maps of the one or more regions may be backed up. For one or more regions marked as dirty in a dirty region map, all used portions of storage in the one or more regions may be backed up. This may be significantly faster than a full backup and may use less space and require less overhead and I/O processing than if each modified portion, such as a block, had been flagged in non-volatile storage for each write. -
Restoration module 218 may enable restoration of data after a system crash, outage, or other interruption. A user may desire to roll back the data or return the system to an earlier state (e.g., a software upgrade or installation may have been responsible for the crash and a restore may put back an earlier stable version.)Restoration module 218 may use a dirty region map and one or more block maps to identify changed data to be restored. In one or more regions indicated as clean in a dirty region map,restoration module 218 may restore only portions of data which were modified since a last backup, as indicated by one or more block maps. In one or more regions marked as dirty in a dirty region map,restoration module 218 may restore all portions or blocks of data, The number of dirty regions may typically be small and the number of changed portions in clean regions may be significantly less than in the entire region. Thus, restoration time and I/O processing may be significantly less than that of a full restoration. -
Error handling module 220 may handle errors associated with modification tracking, reconciliation of modification tracking, backups, and restorations.Error handling module 220 may log errors, such as errors occurring during modification tracking, and other error related events. - Referring to
FIG. 3 , there is depicted amethod 300 for providing system recovery in accordance with an embodiment of the present disclosure. Atblock 302, themethod 300 may begin. - At
block 304, themethod 300 may comprise receiving a request to write to storage. The request may be received by a device driver tracking write requests to storage such as disk, tape, or other storage media. - At
block 306, themethod 300 may comprise identifying a region associated with an area of storage targeted by the write request. The size and number of one or more regions for a storage area, such as a volume, may vary depending on the size of the storage area, the operating system, or other factors. Once a region corresponding to a write request has been identified, a corresponding indicator, flag, or bit corresponding to a dirty region map may be identified. In some embodiments, there may be a plurality of dirty region maps and an appropriate dirty region map may be identified (e.g., a top level dirty region map may contain indicators to a plurality of lower level dirty region maps, which may provide further subdivision of storage). - At
block 308, themethod 300 may comprise determining whether a dirty region indicator, bit, or flag requires setting. During a first write to a region since one or more block maps of the region were flushed to disk, the region may be indicated as clean on a dirty region map and may require setting an indicator to signify the region is dirty. If other writes in the region have occurred which have not been recorded in one or more block maps in non-volatile storage, the region may already be indicated as dirty in a dirty region map, Other factors may be considered when determining whether to set a region to dirty. For example, if every portion of a region has already been indicated as modified in corresponding block maps in non-volatile storage, it may not be necessary in some embodiments to mark a region as dirty. If a corresponding region indicator is to be set, themethod 300 may continue atblock 310. If a corresponding region indicator does not require setting, themethod 300 may continue atblock 312. - At
block 310, themethod 300 may comprise setting an appropriate flag, bit, or indicator corresponding to a region to be marked as dirty (i.e., the region for which the write request was received). The setting of the flag, bit, or other indicator may occur in memory, followed by writing the updated portion of the dirty region map to non-volatile storage, such as disk. After writing the dirty region map update to non-volatile storage, themethod 300 may continue atblock 311. - At
block 311, the write request may be completed. The data identified in the write request may be written to non-volatile storage such as disk. - At
block 312, themethod 300 may comprise determining whether or not to write to non-volatile storage one or more block indicators corresponding to portions of storage modified in the write request. The block indicators may be set in a block map in memory. However, a determination may also be made whether to write block maps from memory to non-volatile storage, such as disk. The determination may be made based on a level of storage I/O processing occurring, such as the level of I/O processing associated with a corresponding region of a disk. In one or more embodiments, other factors may be considered. For example, a flag or indicator may be set when every portion of a region has been indicated as modified on non-volatile storage (e.g., all bits of block maps for the region have previously been set in non-volatile storage and the region has previously been marked as clean). If one or more block indicators for a region are not to be set because all block indicators for the region have been set or because of other factors, themethod 300 may end atblock 320. If one or more block indicators for a region are not to be set at the present time because of a level of storage I/O processing or other factors, themethod 300 may continue atblock 314. If one or more block indicators for a region are to be set, themethod 300 may continue atblock 316. - At
block 314, themethod 300 may comprise waiting. The wait period may be specified by a users specified by the system, determined by an algorithm, or received as an input. After the expiration of the wait period, themethod 300 may return to block 312. - At
block 316, themethod 300 may comprise setting block indicators corresponding to modified blocks. One or more block maps may be written to non-volatile storage. This may involve reading a prior block map from non-volatile storage and updating it. In some embodiments, additional indicators may be used. For example, there may be an indicator set for a region if that region has not previously been dirty. If this indicator is set, updates to blocks in that region may not require reading in a block map from non-volatile storage prior to updating a block map, since the block maps in that region have not previously been set. - At
block 318, themethod 300 may comprise clearing one or more region indicators. Once all block maps for a region have been written to storage, a region indicator in a corresponding dirty region map may be cleared. - At
block 320, themethod 300 may end. - Referring to
FIG. 4 , there is depicted amethod 400 for providing system reconciliation in accordance with an embodiment of the present disclosure. Atblock 402, themethod 400 may begin. - At
block 404, themethod 400 may comprise determining or receiving input regarding whether to continue change tracking or perform another action, such as a backup or a restore. If change tracking is to be continued, themethod 400 may continue atblock 414. Otherwise,method 400 may continue atblock 406. - At
block 406, themethod 400 may comprise determining or receiving input as to a further action to take. If a backup is to be taken, themethod 400 may continue atblock 410. If a restoration is to be performed, themethod 400 may continue atblock 408. - At
block 408, themethod 408 may comprise performing a restore operation. Performing a restore operation using change tracking is described in further detail in reference toFIG. 6 below. - At
block 410, themethod 400 may comprise performing a backup, such as an incremental backup. Performing an incremental backup using change tracking is described in further detail in reference toFIG. 5 below. - At
block 414, themethod 400 may comprise creating an image of storage, such as a snapshot. According to one or more embodiments, once an image has been created change tracking may resume. - At
block 416, themethod 400 may comprise comparing portions of the image, in regions indicated as dirty by a dirty region map, to corresponding portions in a backup. The comparison may identify one or more portions of a dirty region which may have been modified since the backup was created. - At
block 418, themethod 400 may comprise updating one or more flags, bits, or other indicators on one or more block maps. The updates may correspond to portions identified as modified inblock 416. - At
block 420, themethod 400 may comprise continuing change tracking. - At
block 422, themethod 400 may end. - Referring to
FIG. 5 , there is depicted amethod 500 for providing an incremental backup in accordance with an embodiment of the present disclosure. Atblock 502, themethod 500 may begin. - At
block 504, themethod 500 may comprise determining whether a region is clean or dirty. Themethod 500 may comprise using one or more dirty region maps to identify a corresponding dirty region indicator on a map. If the corresponding indicator is set, themethod 500 may continue atblock 508. If the corresponding indicator is not set, themethod 500 may continue atblock 506. - At
block 506, themethod 500 may comprise capturing to backup blocks indicated as changed in a region indicated as clean. It may only capture a subset of the changed blocks, namely those allocated by the file system. - At block 50S, the
method 500 may comprise capturing to backup blocks allocated by the file system in a region indicated as dirty. - At
block 510, themethod 500 may comprise determining whether there are more regions to be backed up. If there are more regions to be backed up, themethod 500 may return to block 504. If there are no more regions to be backed up, the method may continue atblock 512. - At
block 512, themethod 500 may comprise deduplicating backup data. Such deduplication may reduce and/or remove redundant data and may decrease storage and I/O processing required for the backup data. For example, if some blocks captured atblock 508 have not changed since a prior backup, this step may identify them as having been previously backed up. This may prevent the blocks from being stored a second time (i.e., redundantly). - At
block 514, themethod 500 may end. - Referring to
FIG. 6 , there is depicted amethod 600 for providing system restoration in accordance with an embodiment of the present disclosure. Atblock 602, themethod 600 may begin. - At
block 604, themethod 600 may comprise determining whether a region is clean or dirty. Themethod 600 may comprise using one or more dirty region maps to identify a corresponding dirty region indicator on a map. If the corresponding indicator is set, themethod 600 may continue atblock 608. If the corresponding indicator is not set, themethod 600 may continue atblock 606. - At
block 606, themethod 600 may comprise restoring backup portions, such as blocks, indicated as changed in a region indicated as clean. - At
block 608, themethod 600 may comprise restoring all backup blocks in a region indicated as dirty. - At
block 610, themethod 600 may comprise determining whether additional regions are to be restored. If additional regions are to be restored, themethod 600 may return to block 604. If no additional regions are to be restored, themethod 600 may continue atblock 612. - At
block 612, themethod 600 may end. - At this point it should be noted that providing a system recovery in accordance with the present disclosure as described above typically involves the processing of input data and the generation of output data to some extent. This input data processing and output data generation may be implemented in hardware or software. For example, specific electronic components may be employed in a module for system recovery or similar or related circuitry for implementing the functions associated with providing system recovery in accordance with the present disclosure as described above. Alternatively, one or more processors operating in accordance with instructions may implement the functions associated with providing system recovery in accordance with the present disclosure as described above. If such is the case, it is within the scope of the present disclosure that such instructions may be stored on one or more processor readable media (e.g., a magnetic disk or other storage medium), or transmitted to one or more processors via one or more signals embodied in one or more carrier waves.
- The present disclosure is not to be limited in scope by the specific embodiments described herein. Indeed, other various embodiments of and modifications to the present disclosure, in addition to those described herein, will be apparent to those of ordinary skill in the art from the foregoing description and accompanying drawings. Thus, such other embodiments and modifications are intended to fall within the scope of the present disclosure. Further, although the present disclosure has been described herein in the context of a particular implementation in a particular environment for a particular purpose, those of ordinary skill in the art will recognize that its usefulness is not limited thereto and that the present disclosure may be beneficially implemented in any number of environments for any number of purposes. Accordingly, the claims set forth below should be construed in view of the full breadth and spirit of the present disclosure as described herein.
Claims (20)
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/431,497 US8996826B2 (en) | 2009-04-28 | 2009-04-28 | Techniques for system recovery using change tracking |
EP10772460.1A EP2425344B1 (en) | 2009-04-28 | 2010-04-22 | Method and system for system recovery using change tracking |
CN201080029047.0A CN102460401B (en) | 2009-04-28 | 2010-04-22 | Change is utilized to follow the tracks of the technology of carrying out System recover |
PCT/US2010/031979 WO2010129179A2 (en) | 2009-04-28 | 2010-04-22 | Techniques for system recovery using change tracking |
JP2012508538A JP5669823B2 (en) | 2009-04-28 | 2010-04-22 | System recovery method using change tracking |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/431,497 US8996826B2 (en) | 2009-04-28 | 2009-04-28 | Techniques for system recovery using change tracking |
Publications (2)
Publication Number | Publication Date |
---|---|
US20100274980A1 true US20100274980A1 (en) | 2010-10-28 |
US8996826B2 US8996826B2 (en) | 2015-03-31 |
Family
ID=42993138
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/431,497 Active 2031-06-29 US8996826B2 (en) | 2009-04-28 | 2009-04-28 | Techniques for system recovery using change tracking |
Country Status (5)
Country | Link |
---|---|
US (1) | US8996826B2 (en) |
EP (1) | EP2425344B1 (en) |
JP (1) | JP5669823B2 (en) |
CN (1) | CN102460401B (en) |
WO (1) | WO2010129179A2 (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102929750A (en) * | 2011-09-12 | 2013-02-13 | 微软公司 | Nonvolatile media dirty region tracking |
US8671085B2 (en) | 2011-12-09 | 2014-03-11 | Microsoft Corporation | Consistent database recovery across constituent segments |
US20140244601A1 (en) * | 2013-02-28 | 2014-08-28 | Microsoft Corporation | Granular partial recall of deduplicated files |
WO2016114921A1 (en) * | 2015-01-12 | 2016-07-21 | Microsoft Technology Licensing, Llc | Change tracking using redundency in logical time |
US9430272B2 (en) | 2014-12-17 | 2016-08-30 | Microsoft Technology Licensing, Llc | Efficiently providing virtual machine reference points |
US9489267B1 (en) * | 2014-12-19 | 2016-11-08 | Emc Corporation | Optimization to permit block based incremental backup across system reboot or crash |
US10402337B2 (en) * | 2017-08-03 | 2019-09-03 | Micron Technology, Inc. | Cache filter |
US10496303B2 (en) | 2015-12-30 | 2019-12-03 | Huawei Technologies Co., Ltd. | Method for reducing power consumption memory, and computer device |
US20220382647A1 (en) * | 2021-05-27 | 2022-12-01 | EMC IP Holding Company LLC | Leveraging metadata of a deduplication storage system to perform an efficient restore of backup data |
US20230273734A1 (en) * | 2021-09-30 | 2023-08-31 | Kioxia Corporation | SSD Supporting Deallocate Summary Bit Table and Associated SSD Operations |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8918606B1 (en) * | 2009-05-01 | 2014-12-23 | Symantec Corporation | Techniques for providing incremental backups |
US8639976B2 (en) | 2011-02-15 | 2014-01-28 | Coraid, Inc. | Power failure management in components of storage area network |
JP5720366B2 (en) * | 2011-03-29 | 2015-05-20 | 日本電気株式会社 | File management system and backup method |
Citations (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5649152A (en) * | 1994-10-13 | 1997-07-15 | Vinca Corporation | Method and system for providing a static snapshot of data stored on a mass storage system |
US5835953A (en) * | 1994-10-13 | 1998-11-10 | Vinca Corporation | Backup system that takes a snapshot of the locations in a mass storage device that has been identified for updating prior to updating |
US20010000821A1 (en) * | 1998-10-07 | 2001-05-03 | International Business Machines Corporation | On-the-fly garbage collector |
US20020059505A1 (en) * | 1998-06-30 | 2002-05-16 | St. Pierre Edgar J. | Method and apparatus for differential backup in a computer storage system |
US20020065985A1 (en) * | 2000-11-29 | 2002-05-30 | Garnett Paul Jeffrey | Efficient memory modification tracking |
US20020112134A1 (en) * | 2000-12-21 | 2002-08-15 | Ohran Richard S. | Incrementally restoring a mass storage device to a prior state |
US20040210608A1 (en) * | 2003-04-18 | 2004-10-21 | Lee Howard F. | Method and apparatus for automatically archiving a file system |
US20040268068A1 (en) * | 2003-06-24 | 2004-12-30 | International Business Machines Corporation | Efficient method for copying and creating block-level incremental backups of large files and sparse files |
US6981114B1 (en) * | 2002-10-16 | 2005-12-27 | Veritas Operating Corporation | Snapshot reconstruction from an existing snapshot and one or more modification logs |
US7051173B2 (en) * | 2000-02-04 | 2006-05-23 | Fujitsu Limited | Backup system and method thereof in disk shared file system |
US20060129610A1 (en) * | 2004-12-09 | 2006-06-15 | International Business Machines Corporation | Adaptive incremental checkpointing |
US7100089B1 (en) * | 2002-09-06 | 2006-08-29 | 3Pardata, Inc. | Determining differences between snapshots |
US7266574B1 (en) * | 2001-12-31 | 2007-09-04 | Emc Corporation | Identification of updated files for incremental backup |
US20080071842A1 (en) * | 2006-09-20 | 2008-03-20 | Hitachi, Ltd. | Database management system to reduce capacity of storage volume |
US20080098157A1 (en) * | 2006-10-23 | 2008-04-24 | Andrewartha J Michael | Non-volatile storage |
US20080117685A1 (en) * | 2006-11-16 | 2008-05-22 | Freescale Semiconductor, Inc. | Memory device with retained indicator of read reference level |
US7395378B1 (en) * | 2005-01-04 | 2008-07-01 | Symantec Operating Corporation | System and method for updating a copy-on-write snapshot based on a dirty region log |
US20080162600A1 (en) * | 2006-12-27 | 2008-07-03 | Microsoft Corporation | Optimizing backup and recovery utilizing change tracking |
US20100250258A1 (en) * | 2004-07-01 | 2010-09-30 | Dolby Laboratories Licensing Corporation | Method for Correcting Metadata Affecting the Playback Loudness of Audio Information |
US20100287351A1 (en) * | 2007-06-28 | 2010-11-11 | Nokia Corporation | File access management system |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006164162A (en) * | 2004-12-10 | 2006-06-22 | Fujitsu Ltd | Copy control device and method |
CN101408855B (en) * | 2008-11-07 | 2010-06-02 | 北京威视数据系统有限公司 | Method for protecting remote backup equipment of temporary abnormity by continuous data protective system |
-
2009
- 2009-04-28 US US12/431,497 patent/US8996826B2/en active Active
-
2010
- 2010-04-22 EP EP10772460.1A patent/EP2425344B1/en active Active
- 2010-04-22 CN CN201080029047.0A patent/CN102460401B/en active Active
- 2010-04-22 JP JP2012508538A patent/JP5669823B2/en not_active Expired - Fee Related
- 2010-04-22 WO PCT/US2010/031979 patent/WO2010129179A2/en active Application Filing
Patent Citations (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5649152A (en) * | 1994-10-13 | 1997-07-15 | Vinca Corporation | Method and system for providing a static snapshot of data stored on a mass storage system |
US5835953A (en) * | 1994-10-13 | 1998-11-10 | Vinca Corporation | Backup system that takes a snapshot of the locations in a mass storage device that has been identified for updating prior to updating |
US20020059505A1 (en) * | 1998-06-30 | 2002-05-16 | St. Pierre Edgar J. | Method and apparatus for differential backup in a computer storage system |
US20010000821A1 (en) * | 1998-10-07 | 2001-05-03 | International Business Machines Corporation | On-the-fly garbage collector |
US7051173B2 (en) * | 2000-02-04 | 2006-05-23 | Fujitsu Limited | Backup system and method thereof in disk shared file system |
US20020065985A1 (en) * | 2000-11-29 | 2002-05-30 | Garnett Paul Jeffrey | Efficient memory modification tracking |
US20020112134A1 (en) * | 2000-12-21 | 2002-08-15 | Ohran Richard S. | Incrementally restoring a mass storage device to a prior state |
US7266574B1 (en) * | 2001-12-31 | 2007-09-04 | Emc Corporation | Identification of updated files for incremental backup |
US7100089B1 (en) * | 2002-09-06 | 2006-08-29 | 3Pardata, Inc. | Determining differences between snapshots |
US6981114B1 (en) * | 2002-10-16 | 2005-12-27 | Veritas Operating Corporation | Snapshot reconstruction from an existing snapshot and one or more modification logs |
US20040210608A1 (en) * | 2003-04-18 | 2004-10-21 | Lee Howard F. | Method and apparatus for automatically archiving a file system |
US20040268068A1 (en) * | 2003-06-24 | 2004-12-30 | International Business Machines Corporation | Efficient method for copying and creating block-level incremental backups of large files and sparse files |
US20100250258A1 (en) * | 2004-07-01 | 2010-09-30 | Dolby Laboratories Licensing Corporation | Method for Correcting Metadata Affecting the Playback Loudness of Audio Information |
US20060129610A1 (en) * | 2004-12-09 | 2006-06-15 | International Business Machines Corporation | Adaptive incremental checkpointing |
US7395378B1 (en) * | 2005-01-04 | 2008-07-01 | Symantec Operating Corporation | System and method for updating a copy-on-write snapshot based on a dirty region log |
US20080071842A1 (en) * | 2006-09-20 | 2008-03-20 | Hitachi, Ltd. | Database management system to reduce capacity of storage volume |
US20080098157A1 (en) * | 2006-10-23 | 2008-04-24 | Andrewartha J Michael | Non-volatile storage |
US20080117685A1 (en) * | 2006-11-16 | 2008-05-22 | Freescale Semiconductor, Inc. | Memory device with retained indicator of read reference level |
US20080162600A1 (en) * | 2006-12-27 | 2008-07-03 | Microsoft Corporation | Optimizing backup and recovery utilizing change tracking |
US20100287351A1 (en) * | 2007-06-28 | 2010-11-11 | Nokia Corporation | File access management system |
Cited By (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU2017228544B2 (en) * | 2011-09-12 | 2019-05-16 | Microsoft Technology Licensing, Llc | Nonvolatile media dirty region tracking |
WO2013039522A1 (en) * | 2011-09-12 | 2013-03-21 | Microsoft Corporation | Nonvolatile media dirty region tracking |
JP2014530393A (en) * | 2011-09-12 | 2014-11-17 | マイクロソフト コーポレーション | Dirty area tracking of non-volatile media |
US9003103B2 (en) | 2011-09-12 | 2015-04-07 | Microsoft Technology Licensing, Llc | Nonvolatile media dirty region tracking |
EP2756405A4 (en) * | 2011-09-12 | 2015-09-02 | Microsoft Technology Licensing Llc | Nonvolatile media dirty region tracking |
RU2728816C2 (en) * | 2011-09-12 | 2020-07-31 | МАЙКРОСОФТ ТЕКНОЛОДЖИ ЛАЙСЕНСИНГ, ЭлЭлСи | Tracking "dirty" areas of nonvolatile media |
KR101921365B1 (en) * | 2011-09-12 | 2018-11-22 | 마이크로소프트 테크놀로지 라이센싱, 엘엘씨 | Nonvolatile media dirty region tracking |
CN102929750A (en) * | 2011-09-12 | 2013-02-13 | 微软公司 | Nonvolatile media dirty region tracking |
US8671085B2 (en) | 2011-12-09 | 2014-03-11 | Microsoft Corporation | Consistent database recovery across constituent segments |
US20140244601A1 (en) * | 2013-02-28 | 2014-08-28 | Microsoft Corporation | Granular partial recall of deduplicated files |
US10180943B2 (en) * | 2013-02-28 | 2019-01-15 | Microsoft Technology Licensing, Llc | Granular partial recall of deduplicated files |
US9430272B2 (en) | 2014-12-17 | 2016-08-30 | Microsoft Technology Licensing, Llc | Efficiently providing virtual machine reference points |
US9875160B2 (en) | 2014-12-17 | 2018-01-23 | Microsoft Technology Licensing, Llc | Efficiently providing virtual machine reference points |
US9823976B2 (en) * | 2014-12-19 | 2017-11-21 | EMC IP Holding Company LLC | Optimization to permit block based incremental backup across system reboot or crash |
US20170024287A1 (en) * | 2014-12-19 | 2017-01-26 | Emc Corporation | Optimization to permit block based incremental backup across system reboot or crash |
US9489267B1 (en) * | 2014-12-19 | 2016-11-08 | Emc Corporation | Optimization to permit block based incremental backup across system reboot or crash |
US10402279B2 (en) | 2014-12-19 | 2019-09-03 | EMC IP Holding Company LLC | Optimization to permit block based incremental backup across system reboot or crash |
US9547555B2 (en) | 2015-01-12 | 2017-01-17 | Microsoft Technology Licensing, Llc | Change tracking using redundancy in logical time |
WO2016114921A1 (en) * | 2015-01-12 | 2016-07-21 | Microsoft Technology Licensing, Llc | Change tracking using redundency in logical time |
US10496303B2 (en) | 2015-12-30 | 2019-12-03 | Huawei Technologies Co., Ltd. | Method for reducing power consumption memory, and computer device |
US10402337B2 (en) * | 2017-08-03 | 2019-09-03 | Micron Technology, Inc. | Cache filter |
US11366762B2 (en) | 2017-08-03 | 2022-06-21 | Micron Technology, Inc. | Cache filter |
US11853224B2 (en) | 2017-08-03 | 2023-12-26 | Micron Technology, Inc. | Cache filter |
US20220382647A1 (en) * | 2021-05-27 | 2022-12-01 | EMC IP Holding Company LLC | Leveraging metadata of a deduplication storage system to perform an efficient restore of backup data |
US11977454B2 (en) * | 2021-05-27 | 2024-05-07 | EMC IP Holding Company LLC | Leveraging metadata of a deduplication storage system to perform an efficient restore of backup data |
US20230273734A1 (en) * | 2021-09-30 | 2023-08-31 | Kioxia Corporation | SSD Supporting Deallocate Summary Bit Table and Associated SSD Operations |
Also Published As
Publication number | Publication date |
---|---|
WO2010129179A3 (en) | 2010-12-29 |
EP2425344B1 (en) | 2016-02-17 |
JP2012525636A (en) | 2012-10-22 |
CN102460401A (en) | 2012-05-16 |
JP5669823B2 (en) | 2015-02-18 |
EP2425344A4 (en) | 2014-05-28 |
CN102460401B (en) | 2016-02-10 |
EP2425344A2 (en) | 2012-03-07 |
US8996826B2 (en) | 2015-03-31 |
WO2010129179A2 (en) | 2010-11-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8996826B2 (en) | Techniques for system recovery using change tracking | |
US10235066B1 (en) | Journal destage relay for online system checkpoint creation | |
US10346253B2 (en) | Threshold based incremental flashcopy backup of a raid protected array | |
US9600375B2 (en) | Synchronized flashcopy backup restore of a RAID protected array | |
US8046547B1 (en) | Storage system snapshots for continuous file protection | |
US10268695B2 (en) | Snapshot creation | |
US8260747B2 (en) | System, method, and computer program product for allowing access to backup data | |
US7490103B2 (en) | Method and system for backing up data | |
US7650533B1 (en) | Method and system for performing a restoration in a continuous data protection system | |
US8554734B1 (en) | Continuous data protection journaling in data storage systems | |
US9229818B2 (en) | Adaptive retention for backup data | |
US8918606B1 (en) | Techniques for providing incremental backups | |
RU2728816C2 (en) | Tracking "dirty" areas of nonvolatile media | |
KR101870521B1 (en) | Methods and systems for improving storage journaling | |
US9037819B2 (en) | Source cleaning cascaded volumes using reference counts | |
US7383465B1 (en) | Undoable volume using write logging | |
US20080162599A1 (en) | Optimizing backup and recovery utilizing change tracking | |
US9069711B2 (en) | Source cleaning cascaded volumes using write and background copy indicators | |
KR20150081810A (en) | Method and device for multiple snapshot management of data storage media | |
US10613923B2 (en) | Recovering log-structured filesystems from physical replicas | |
US11099946B1 (en) | Differential restore using block-based backups | |
US9286163B2 (en) | Data recovery scheme based on data backup status | |
CN107402841B (en) | Data restoration method and device for large-scale distributed file system | |
US8131958B2 (en) | Storage system, storage device, and data updating method using a journal volume | |
US20220374310A1 (en) | Write request completion notification in response to partial hardening of write data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: SYMANTEC CORPORATION, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:STRINGHAM, RUSSELL;REEL/FRAME:022607/0665 Effective date: 20090428 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: VERITAS US IP HOLDINGS LLC, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SYMANTEC CORPORATION;REEL/FRAME:037697/0412 Effective date: 20160129 |
|
AS | Assignment |
Owner name: WILMINGTON TRUST, NATIONAL ASSOCIATION, AS COLLATERAL AGENT, CONNECTICUT Free format text: SECURITY INTEREST;ASSIGNOR:VERITAS US IP HOLDINGS LLC;REEL/FRAME:037891/0726 Effective date: 20160129 Owner name: BANK OF AMERICA, N.A., AS COLLATERAL AGENT, NORTH CAROLINA Free format text: SECURITY INTEREST;ASSIGNOR:VERITAS US IP HOLDINGS LLC;REEL/FRAME:037891/0001 Effective date: 20160129 Owner name: BANK OF AMERICA, N.A., AS COLLATERAL AGENT, NORTH Free format text: SECURITY INTEREST;ASSIGNOR:VERITAS US IP HOLDINGS LLC;REEL/FRAME:037891/0001 Effective date: 20160129 Owner name: WILMINGTON TRUST, NATIONAL ASSOCIATION, AS COLLATE Free format text: SECURITY INTEREST;ASSIGNOR:VERITAS US IP HOLDINGS LLC;REEL/FRAME:037891/0726 Effective date: 20160129 |
|
AS | Assignment |
Owner name: VERITAS TECHNOLOGIES LLC, CALIFORNIA Free format text: MERGER AND CHANGE OF NAME;ASSIGNORS:VERITAS US IP HOLDINGS LLC;VERITAS TECHNOLOGIES LLC;REEL/FRAME:038455/0752 Effective date: 20160329 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |
|
AS | Assignment |
Owner name: WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENT, DELAWARE Free format text: SECURITY INTEREST;ASSIGNOR:VERITAS TECHNOLOGIES LLC;REEL/FRAME:054370/0134 Effective date: 20200820 |
|
AS | Assignment |
Owner name: VERITAS US IP HOLDINGS, LLC, CALIFORNIA Free format text: TERMINATION AND RELEASE OF SECURITY IN PATENTS AT R/F 037891/0726;ASSIGNOR:WILMINGTON TRUST, NATIONAL ASSOCIATION, AS COLLATERAL AGENT;REEL/FRAME:054535/0814 Effective date: 20201127 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |